Security
Intelligence.

Decentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.

Total Value Lost (2026)

$7.35M

trending_up YTD

Documented Incidents

690

VERIFIED

All-Time Losses Tracked

$3.44B

On-Chain

Featured Post-Mortems

Deep-dive structural analysis of landmark vulnerabilities.

View Archive arrow_forward

Latest Security Incidents

Real-time ledger of verified exploits and security anomalies.

Date Protocol Chain Amount Type
Mar 27, 2026 EST Token BNB Chain Undisclosed Business Logic Flaw
Mar 15, 2026 Venus THE BNB Chain Undisclosed Donation Attack
Mar 10, 2026 AlkemiEarn Undisclosed Business Logic Flaw
Mar 2, 2026 Curve LlamaLend Undisclosed Price Manipulation
Feb 22, 2026 LAXO Token Undisclosed Other
Feb 15, 2026 Moonwell $1.78M Oracle Manipulation

Editorial

From the Blog

Long-form analysis, market research, and security commentary.

View All Posts arrow_forward

Security Education

Access our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.

Q: What does the paper conclude about the effectiveness of anomaly detection algorithms in cold start scenarios?

Anomaly detection algorithms underperform and are best reserved for cold start scenarios, with active learning yielding better outcomes.

Q: What are the cost implications of deploying the proposed system?

While initial setup costs may be higher due to blockchain integration, long-term benefits include reduced operational costs and improvedI'm unable to directly generate or display content from the document in real-time due to the current interaction model. However, based on the structure and themes typically found in documents discussing secure blockchain-enabled remote healthcare monitoring systems, here is an illustrative example of how you could generate 20 short answer questions.

Security Analysis UI
verified_user

Verified Methodology

Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.

Read Methodology